AP CSP vocab and crap Flashcards
a heuristic process may include running tests and getting results by
trial and error
the goal of heuristics is to develop a simple process that generates … (or …) results in an …
accurate; approximate; acceptable amount of time
digital certificate is the same thing as
public key certificate
a digital certificate is an electronic … that allows a person, computer, or organization to exchange information securely over the Internet using the
public key infrastructure (PKI)
a digital certificate provides …., is … resistant and can be … because it was issued by an …, … agency
contains the name of the certificate holder, a … number, … dates, a copy of the certificate holder’s … and the … of the certificate-issuing authority
identifying information; forgery; verified; official, trusted; serial; expiration; public key; digital signature
append: to add at the
end
DNS Subdomain: hostname that belongs to your domain
e.g.
about.example.com
selection: a generic term for a type of programming statement (usually an if-statement) that uses a … condition to determine/select whether or not to run a …
Boolean; certain block of statements
iterate: to … in order to achieve, or get closer to, a desired goal
repeat
bitmap: an array of … representing the values of … in an image/display
binary data; pixels
floating-point number:
a real number
statement: directs the computer to perform a …
specified action
expression: a group of …. that represent a
symbols; value
procedure: a set of coded instructions that tell a computer how to
run a program/calculation
protocols: a set of rules governing the … or … of data between devices
exchange; transmission
stepwise refinement: a top-down process in which the programmer starts with the … of the program and continually … into …
overall goal; breaks down the design; sub-functions
transistor: a device used to amplify its …, a … switch and the fundamental building block of ..
electrical input; binary; computer circuitry
motherboard: holds together the …, … and … for … and … devices
CPU; memory; connectors; input; output
procedural abstraction: … model of what we want a subprogram to do
mental
data abstraction: the reduction of a particular body of data to a
simplified representation of the whole
expression: any valid unit of code that resolves to a
value
network switch: computer networking device that connects … on a … by using packet switching to receive, process, and forward data to the destination device
devices together; computer network
chip can store … or provide …
computer memory; logic circuitry
Open Systems Interconnection (OSI model) is a conceptual model that characterizes and standardizes the … functions of a telecommunication or computing system without regard to its underlying … and …
communication; internal structure; technology
privatization is the process of transferring an enterprise or industry from the … to the …
public sector; private sector
cryptography is the science of … by transforming it into a secure format. It is used to protect …
protecting information; digital data
virus: a type of malicious software program that, when executed, replicates itself by modifying other … and inserting its own…
computer programs; code
major characteristics of viruses: the ability to … itself, and the ability to …. to another …
replicate; attach itself; computer file
a computer virus needs another … in order to be able to be activated and infect other computer files. essentially, a computer virus piggybacks on another file in your computer
program
phishing: a thief trying to trick you into sending them … Typically these include … about … asking you to send your … and …, … or other things
sensitive information; emails; system updates; username; password; social security number
symmetric encryption: a form of computerized cryptography using a singular … to guise an …
its data conversion uses a mathematical algorithm along with a …, which results in the inability to …
encryption key; electronic message; secret key; make sense out of a message
public key encryption: used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, … It uses an … in which the encryption key is made …, but the decryption key is kept …
a secret key; asymmetric encryption scheme; public; private
vigenere cipher: a method of encrypting alphabetic text by using a series of interwoven … based on the letters of a …
Caesar ciphers; keyword
certificate authority: a trusted entity that issues … that verify a … on the Internet
essential part of secure communication and play an important part in the public key infrastructure
electronic documents; digital entity’s identity
trust model of the internet: users must … if they want them to do anything useful on their computers
trust applications
open standards: standards made available to the … and are developed (or approved) and maintained via a … and … driven process
general public; collaborative; consensus
distributed denial of service (DDoS) attack: occurs when … flood the bandwidth/resources of a targeted system, usually one or more … –> often the result of multiple …
multiple systems; web servers; compromised systems
denial of service (DOS): an interruption in an authorized user’s …, typically one caused with malicious intent
access to a computer network
404 error: website’s server could not find the … requested by the user
URL
DNS spoofing: a type of computer attack wherein a user is forced to navigate to a … disguised to look like a real one, with the intention of diverting … or stealing .. of the users
fake website; traffic; credentials
firewall: software that runs on … (often …) that only allows traffic through according to some set of …
servers; routers; security rules
DNS: the service that translates … to …
URLs; IP addresses
sequencing: putting commands in … so computers can …
correct order; read the commands
network redundancy: having multiple … to ensure … during cases of … or …
backups; reliability; high usage; failure
Internet Engineering Task Force (IETF): develops and promotes … Internet … and … in particular, the standards that comprise the … (…/…)
voluntary; standards; protocols; Internet protocol suite (TCP/IP)
top-level domain: last segment of the domain name, the part that follows immediately after the
dot symbol